Zobrazeno 1 - 10
of 99
pro vyhledávání: '"Borg, Anton"'
EU directives stipulate a systematic follow-up of train delays. In Sweden, the Swedish Transport Administration registers and assigns an appropriate delay attribution code. However, this delay attribution code is assigned manually, which is a complex
Externí odkaz:
http://arxiv.org/abs/2402.04108
Information spreading is an interesting field in the domain of online social media. In this work, we are investigating how well different seed selection strategies affect the spreading processes simulated using independent cascade model on eighteen m
Externí odkaz:
http://arxiv.org/abs/1710.04391
Autor:
Borg, Anton
Law enforcement agencies regularly collect crime scene information. There exists, however, no detailed, systematic procedure for this. The data collected is affected by the experience or current condition of law enforcement officers. Consequently, th
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:bth-00597
Publikováno v:
Entropy 2016, 18, 164
Influential users play an important role in online social networks since users tend to have an impact on one other. Therefore, the proposed work analyzes users and their behavior in order to identify influential users and predict user participation.
Externí odkaz:
http://arxiv.org/abs/1604.08075
Autor:
Borg, Anton
Background: Computer users often need to distinguish between good and bad instances of software and e-mail messages without the aid of experts. This decision process is further complicated as the perception of spam and spyware varies between individu
Externí odkaz:
http://urn.kb.se/resolve?urn=urn:nbn:se:bth-00533
Autor:
Borg, Anton, Boldt, Martin
Publikováno v:
In Expert Systems With Applications 30 December 2020 162
Publikováno v:
AI; Mar2024, Vol. 5 Issue 1, p208-236, 29p
Autor:
Borg, Anton1 (AUTHOR) anton.borg@bth.se, Boldt, Martin1 (AUTHOR), Rosander, Oliver1 (AUTHOR), Ahlstrand, Jim1 (AUTHOR)
Publikováno v:
Neural Computing & Applications. Mar2021, Vol. 33 Issue 6, p1881-1902. 22p.
Publikováno v:
Energy Informatics. 5
Network anomaly detection for critical infrastructure supervisory control and data acquisition (SCADA) systems is the first line of defense against cyber-attacks. Often hybrid methods, such as machine learning with signature-based intrusion detection